At Rectiphy, innovation goes beyond the spelling of the company name to
include its new technology—that is, the company's ActiveImage Protector
Linux Edition. The product is a disk-imaging backup technology for
Linux environments that incorporates Rectiphy's Smart Sector snapshot
technology, which the company says speeds up backups and reduces disk
storage space in Ext2/Ext3/Ext4 formats. Support for the Linux-native
snapshot driver enables users to create a full backup of the Linux
server HD or volume without shutting down the OS. Bare-metal recovery is
supported, as well as retrieval of individual files from the backup image.

Few things will burnish your hard-core technorati credentials like learning
the classic document markup language LaTeX and its typesetting companion
program TeX. The tools are used for creating scientific and technical
documents. Get up to speed fast with Stefan Kottwitz's LaTeX Beginner's
Guide, a new book that helps new users overcome LaTeX's relatively
steep learning curve and leverage its powerful features. Readers learn
to typeset documents containing tables, figures, formulas and common
book elements like bibliographies, glossaries and indexes. Additional
topics include management of complex documents and the latest fonts and
PDF-related features. A great deal of the book is dedicated to one of
LaTeX's most powerful features: the designing of complex math formulas
and other expressions.

Syngress describes Cory Altheide and Harlan Carvey's new book Digital
Forensics with Open Source Tools as “digital forensics, MacGyver
style.” Unfortunately for the 1980s TV hero MacGyver, his toolset
predated open source. But thanks to Altheide and Carvey, you have all
the open-source forensics tools at your disposal for investigating Linux,
Mac and Windows systems, complete with guidance. Topics include
the open-source examination platform, disk and filesystem analysis,
system-specific issues and artifacts, Internet-related artifacts, file
analysis, automating analysis and more. The appendix goes into detail
on particularly useful open-source tools.

The team at Xelltec categorizes it new Xelltec Integrated Security
System (XISSYS) as “revolutionary” because it enables users
“to
remotely track and protect their laptops and handheld devices”. The
patent-pending XISSYS microchip is an embedded security solution designed
to allow users to disable or find a stolen laptop, smartphone,
or other mobile device easily. This prevents thieves from gaining access to
sensitive data. The microchip can wipe out data, or it can
destroy the mobile device physically with a high-frequency voltage so that it is
completely inoperable. Furthermore, if the user needs the data that
is on the mobile device, it can be copied remotely from the device to a
server before the data is destroyed. The microchip also acts as a tracking
device, enabling the owner to find the physical location of the stolen
device. Xelltec is seeking strategic alliances with popular main board and
computer manufacturing companies worldwide.

If you deploy the new Napatech Software Suite for your network
appliance development, the company says you'll need to
develop its application software only once and then simply decide which
network adapter combination works best in the particular deployment.
Besides this flexibility, the suite offers critical functionality
that can accelerate performance of network appliances. Both a hardware
abstraction and streamlined API are provided, allowing network appliance
vendors to take advantage of Napatech's full range
of intelligent network adapters quickly and easily. Hardware abstraction allows multiple
intelligent network adapters of different types to be combined on a
plug-and-play basis in a standard server platform. The same feature set
can be offered independent of the port speed. A number of open-source
software applications, such as Suricata, Snort and Ostinato are supported.

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.